SOLUTIONS GUIDE GOVERNMENT DECEMBER 2016 TABLE OF CONTENTS INTRODUCTION ARUBA’S SECURE NETWORK ARCHITECTURE DEPLOYMENT LOCATIONS AND TOPOLOGIES GOVERNMENT USE CASES AND SOLUTIONS TECHNOLOGY ADVANTAGES OF THE ARUBA SOLUTION ARCHITECTURE TECHNOLOGY REFERENCE 3 4 16 30 38 41 SOLUTIONS GUIDE INTRODUCTION The purpose of this section is to introduce the reader to the Government Solutions Guide and provide an overview of the wide variety of mobile networking infrastructure solutions that Aruba, a Hewlett Packard Enterprise company, can offer to the government customer. Note to the Reader GOVERNMENT 2.Fully Integrated Security – Aruba understood from the beginning that centralized, end-to-end encryption, role-based access control and a stateful user-based firewall were required as integral components to the WLAN solution, thereby solving the dilemma between seamless mobility and security. 3.Unified Solutions and Future-proofed Architecture – With an Aruba mobility solution, organizations are not The Aruba Government Solutions Guide provides an restricted to specific products for different deployment overview of Aruba’s products and key characteristics and cases. Aruba’s solutions can be used simultaneously for describes different use cases supported by a network WLAN access, mesh, remote access and video powered by Aruba. It is focused on the network environment, surveillance. Aruba provides unified management of the needs and requirements of government organizations. This entire WLAN architecture through our Mobility Controllers document may be read end-to-end, but the reader may find it and our award-winning multi-vendor enterprise wireless beneficial to scan the table of contents and read the sections management solution called AirWave. And, Aruba has a of the document that are deemed most relevant. This purpose-built systems architecture that delivers the document does not communicate product specs like a horsepower needed for the mobility applications of today datasheet or reference end-user case studies since existing and tomorrow. documents from Aruba already provide this. This document is designed to be a reference guide, that brings together the relevant organizational, mission, application and technical information in one place in order to provide government network architects and administrators an answer to the question “what does Aruba do well and how can they best serve our organization?” Aruba Government Solutions Aruba is the leading provider of next-generation wireless network access solutions for the mobile enterprise – including secure wireless LAN (WLAN), remote access, outdoor mesh networks, guest access, classified networking and network solutions. Aruba is a general-purpose secure mobility networking infrastructure company, offering distributed networking solutions for many location-centric or applicationcentric networking requirements. Aruba is the only enterprise WLAN solution vendor that is dedicated to helping government agencies and organizations build best-of-breed, highly secured, mobilityoriented networks. Aruba’s solution differentiators are found within three key core competencies for robust WLAN implementations: Aruba, through our integration partners, has deployed hundreds of ATO-validated and operating enterprise WLAN solutions within the Department of Defense (DoD), each operating hundreds to thousands of access points. Aruba is recognized as the only authorized enterprise WLAN solution provider within the US Air Force, and is only one of two approved enterprise WLAN vendors within the US Army and DoD Military Health System. This Guide is comprised of the following sections: • Components: Overview of Aruba’s products and solution components. • Architecture: Explanation of Aruba’s unique architecture and benefits. • Locations and Topologies: Depiction of the different types of physical deployment scenarios appropriate for an Aruba-based network, including physical and logical topological diagrams. • Use Cases and Solutions: Outline of use cases typically found in the federal government sphere and discussion of Aruba solutions. • Technology Reference: Summary list of Aruba standards, certifications and government validations. 1.W ireless and Mobility – Aruba ensures optimal WLAN device and application performance through the development and deployment of highly tuned RF and mobility control systems. 3 SOLUTIONS GUIDE ARUBA’S SECURE NETWORK ARCHITECTURE This section contains a brief description of the components of the Aruba architecture and its concept of operations. The basic elements are the Aruba Mobility Controller (which runs ArubaOS), optional ArubaOS Software Modules, Aruba Access Points, AirWave Management System, ClearPass Policy Management System and Virtual Internet Access (VIA) client. Mobility Controller The Aruba Mobility Controller serves as the centralized control point for all network and user activity and is designed to address a wide range of wireless and wired network requirements such as mobility, security, policy management, and remote access for networks of any size. Unlike other solutions, Aruba WLAN systems are purpose-built and completely self-contained, and do not require ancillary security appliances or cryptology overlays. Running the ArubaOS operating system, Mobility Controllers support a library of base features and functionality as well as optional software modules including: Adaptive Radio Management, network access control, policy-enforcement per-user firewall, AppRF technology, FIPS 140-2 validated 802.11i, NSA Suite-B crypto termination, and wireless intrusion detection. In competing systems, this level of support requires separate dedicated appliances. GOVERNMENT Key characteristics of the Aruba Mobility Controller include: • Scalability from 1.6Gb/s to 30Gb/s of AES-CCMP-256 or AES-256-GCM encrypted packet throughput • Models available for deployment in a secure Data Center, network core, or branch office • Adaptive 802.11a/b/g/n/ac WLAN support • IPSec/SSL VPN capabilities supporting NSA Suite-B algorithms, which are approved for use in transmission of classified information • Easily deployed as an overlay without any change in the wired network • Works in conjunction with ArubaOS and Aruba Access Points for many different WLAN deployment modes, including campus, mesh, point-to-point and remote • Role-based access control with supporting security policies that can be applied to users, mobile devices, applications, and location • Context awareness of mobile devices connected to the network • FIPS-140-2 Level 2 Validated, Unified Capabilities Approved Products List (UC-APL) certified, Common Criteria Validated • Meets DoD Directive 8100.2, 8500.1 and DoD Directive 8420.1 on WLAN solutions ArubaOS Powering the Aruba solution is ArubaOS®, which serves as the operating system and application engine for all Aruba Mobility Controllers and access devices. ArubaOS includes a base set of capabilities as well as optional software modules enabled through license keys for additional functionality. The software architecture of ArubaOS is designed for scalable performance and is built using three core components: 1.A hardened, multi-core optimized, multi-threaded Figure 1: Aruba Mobility Controllers supervisory kernel managing administration, authentication, logging, and other system operation functions. Mobility Controllers feature programmable network 2.An embedded real-time operating system that powers processors and encryption engines that are optimized for the dedicated packet processing hardware of the 802.11a/b/g/n/ac data, voice, and video networks, providing controller, implementing all routing, switching, and high throughput, massive scalability, and advanced security. Common Criteria validated firewall functions. Controllers are typically installed in a secure data center near the application, servers and voice systems, or in the core network of a building. Controllers are compactly packaged, offer a range of high-availability options, and feature very low energy consumption to reduce ongoing operating expenses 3.A programmable, FIPS, UC-APL and Common Criteria validated encryption/decryption engine built on the controller’s dedicated hardware delivering government-grade security without sacrificing performance. and HVAC loading. For scalability and redundancy, controllers can be logically connected together in a hierarchy. More information on the Aruba Mobility Controllers can be found on the Aruba website. 4 SOLUTIONS GUIDE GOVERNMENT ArubaOS, running on the high-performance controller centralized mobility controller. Aruba has a comprehensive hardware, provides literally hundreds of features and product line for many different deployment environments capabilities, including: that may require support for: • Network integration through L2 services (VLAN, RSTP, etc.) and L3 services (VRRP, OSPF, etc.) • Single and Dual Radio 802.11a/b/g/n/ac Wave 2 • Wireless and wired networks • L2 and L3 secure user connectivity and mobility • Indoor and outdoor usage • Centralized and/or distributed Wi-Fi and IPsec encryption • Telecommuter deployments (including NSA Suite-B) • Network access control, role-based access control and user authentication system integration • Common Criteria validated Policy Enforcement Firewall, identity-based and inter-group/intra-VLAN firewalling • Adaptive Radio Management, providing dynamic wireless RF configuration and optimization • Fair access policies and user traffic management, Quality of Service (QoS) control • Wireless Intrusion Prevention • Device identity capabilities through fingerprinting • Visibility offered by AppRF technology allowing IT to see applications by user, prioritize them, and control access based on policies • FIPS 140-2 Level 2/3 validation, Common Criteria Typeaccreditation, Unified Capabilities Approved Product List • ClientMatch technology that continuously steers clients to the optimum AP based on metrics and eliminates sticky clients and maximizes Wi-Fi performance • Aruba’s SDN API integration with Skype for Business provides full visibility to call quality and detailed call reporting More information can be found on the Aruba website in the ArubaOS datasheet. • Harsh environment and industrial applications • Mesh and wireless bridging deployments • Unclassified and classified environments In addition to providing WLAN and wired network access, wireless access points provide RF monitoring services for both performance and security monitoring. All AP configuration and monitoring takes place from the controller; the intermediate Ethernet LAN or IP WAN requires no modifications for the AP to be deployed – there simply needs to be basic IP connectivity between the AP and the controller. Depending on agency or department needs, any Aruba AP can easily be deployed in one of the following modes via the Controller: • Campus Mode, where the AP is attached to one or more Ethernet connections (typically 802.3at PoE+) and valid user traffic is forwarded untouched from the WLAN to the backbone and vice-versa. • Mesh AP Mode, where the AP is specifically configured to connect to the backbone by transparently and securely bridging traffic via a WLAN point-to-point connection to another AP. • Remote AP Mode, where the AP performs additional traffic management functions to connect the users across a lower-speed, higher-latency IP WAN of any type. Access Points All traffic is IPsec encrypted using government-validated Aruba’s Access Points (APs) serve as secure on-ramps to algorithms between the AP and the Controller, further aggregate wireless and wired user traffic to the enterprise enhancing the communications security posture of network, transporting this traffic between users and the the environment. Figure 2: Aruba Access Points 5 SOLUTIONS GUIDE GOVERNMENT 310 Series 325 Series 5 GHz radio 4x4:43:3 4x4:3:3 2.4 GHz radio 2x2:2 4x4:4 VHT 160 Support yes (2x2) no Built-in BLE yes (2x2) yes Size 162mm x 180mm x48mm 203mm x 203mm x57mm Weight 650g 950g Figure 3: 310/320/330 Series Feature Matrix Summary Aruba’s new series of 802.11ac Wave 2 access points support The AirWave Wireless Management System delivers multi-user MIMO to boost network efficiency. Wave 2 access streamlined management, IDS security, and enhanced points include the 300, 310, 320, and 330 series to match visibility using the following: every need. All series are available with integrated omnidirectional or external antenna options. 1.A irWave Management Platform (AMP): AirWave Management Platform, the core component of AirWave, More information on Aruba Access Points can be found on provides efficient, centralized management of wireless the Aruba website. infrastructure and visibility across the wired edge of AirWave Management System Aruba’s AirWave Management System is a multi-vendor network operations solution for wired and wireless infrastructure as well as mobile devices, eliminating the need for multiple, single-purpose management tools. Available as either installable software or an appliance, AirWave enables the IT service desk to triage connectivity issues as well as providing the network. It communicates with and controls the wireless infrastructure via standard protocols (SNMP, HTTPS, and so on) across a LAN or WAN. It provides an easy-to-use web-based interface that gives people across the IT organization a personalized view of the network with administrative privileges tailored to their specific job responsibilities. a simpler way to enforce policies and actionable information. Figure 4: AirWave Management Platform 6 SOLUTIONS GUIDE 2.AirWave RAPIDS™ Rogue Detection: AirWave RAPIDS GOVERNMENT 3.A irWave VisualRF™ Location and Mapping: AirWave automatically detects and locates unauthorized access VisualRF provides an accurate view of the entire network. points through a patented combination of wireless and It automatically generates a map of the RF environment wired network scans. The RAPIDS software uses existing, and the underlying wired uplinks topology, showing a full authorized APs to scan the RF environment for any view of what the network looks like — in real time. unauthorized devices in range; it also scans the wired VisualRF uses RF measurements gathered from active network to determine whether any unknown devices are wireless access points and controllers, without the need connected. RAPIDS then correlates all of this data and uses for a costly, separate location appliance. a set of rules to highlight only those devices that are truly a threat to the organization, greatly reducing false-positives. It also captures and manages IDS events. RAPIDS improves network security, manages compliance requirements, and reduces the cost of manual security efforts. Figure 5: AirWave RAPIDS™ Rogue Detection Figure 6: AirWave VisualRF™ Location and Mapping 7 SOLUTIONS GUIDE 4.A irWave Clarity Provides End-to-end Visibility: Clarity GOVERNMENT 5.A ppRF Dashboards provide deep visibility into common enables visibility into non-RF metrics – not only giving applications and web traffic on the network to ensure end-to-end visibility into a wireless user experience – but mission-critical apps get priority, users are off risky sites, also the ability to foresee connectivity issues before users or for simply gauging usage patterns. With AirWave, AppRF are even impacted. Live user monitoring lets IT proactively statistics are recorded for the entire network and monitor live client data flow and visualize radio presented in a clean and easy to use dashboard. Whether association, authentication, DHCP and DNS service needing a high level overview or drilling down into the response times and failure rates. details, it all takes just a few clicks. Figure 7: AirWave Clarity Figure 8: AppRF Dashboards 8 SOLUTIONS GUIDE 6.UCC Dashboards provide an aggregated view of the Unified Communication and Collaboration (UCC) calls made in the network. Charts display trending information for UCC call volume, quality and clients. Network administrators see a top level view of the call quality assessment, and can further drill down into a specific view based on the analysis required. Call quality is encapsulated into an Aruba proprietary metric called UCC score. The UCC score for voice and video calls is measured by taking into account the following metrics: • Delay • Jitter • Packet Loss GOVERNMENT ClearPass Access Management System Aruba’s ClearPass Access Management System is a multivendor, standards-based secure network access solution that provides access and policy control across an agency’s wired, wireless, and VPN networks. Designed to be implemented as an overlay solution with an existing network, ClearPass is seamlessly integrated to leverage the existing network, identity, and security infrastructure. ClearPass is FIPS compliant and has Common Criteria validation. In addition, it supports Suite-B digital certificates for authentication of Commercial Solutions for Classified (CSfC) deployments. ClearPass automates user and device access, policy management, and the provisioning of devices for secure network access and posture assessment. This ensures that each user has the correct access privileges depending upon who they are and on which devices they authenticate. Devices running Windows, MacOS, iOS, Android, and Linux can all be managed through ClearPass. Figure 9: UCC Dashboards 9 SOLUTIONS GUIDE Aruba ClearPass is available as a hardware or virtual GOVERNMENT • Device Onboarding and Management: This add-on appliance, supporting tens of thousands of users and devices. module automates 802.1X configuration for IT-managed The ClearPass platform consists of the following modules: devices, such as Windows, Mac OSX, iOS and Android, • Policy Management: Included as part of the ClearPass Management System, the Policy Manager is the central policy enforcement decision point. In a single platform, ClearPass can perform mobile application and device management, device onboarding and management, device health monitoring and guest access. The Policy Manager provides integrated RADIUS and TACACS+ capabilities for AAA, along with authentication support for Microsoft Active Directory, LDAP, SQL and Kerberos authentication databases. As users and devices authenticate to the network, user and endpoint access policies are enforced, providing true context-based access control. Additional features include differentiated access based on a variety of attributes, such as user role, device, time, and location, along with device registration and profiling, endpoint health assessments and reporting. across wired, wireless and VPN networks. For agencies that anticipate the influx of a large number of these devices, the configuration of 802.1X device authentication can be accomplished through an automated provisioning process. For those agencies that support BYOD, the same automated provisioning process can be utilized to allow these devices onto the network. Additional features include the ability to push required applications and configuration settings for mobile email with Exchange ActiveSync and VPN clients for some device types. --ClearPass QuickConnect: Built-into Device Onboarding and Management, this cloud-based service provides users the ability to perform self-service 802.1X configuration capabilities to support 802.1X authentication on wired and wireless networks for Windows, Mac OSX, iOS and Android devices. QuickConnect streamlines device configuration for IT and end-users by presenting a configuration wizard through the use of a captive portal, Active Directory group policy object, or CD. The user authenticates through the portal, runs through the wizard, and provides the overall configuration to be implemented onto the device. Figure 10: ClearPass Policy Management System 10 SOLUTIONS GUIDE • Device Health: These software agents perform advanced GOVERNMENT The Aruba VIA client is currently supported on Windows, endpoint posture assessments to minimize the risk of Mac, LINUX and iOS devices. Suite B capabilities are viruses and misuse of applications before devices are supported on all platforms. allowed on the network. The device health module REMOTE NETWORKING SOLUTION provides support for verifying the presence of anti-virus, anti-spyware, and firewall software from more than 80 DATA CENTER/PRIVATE CLOUD vendors. In addition, it checks for allowable services, processes, peer-to-peer applications such as Skype, USB CO ACCESS AND NETWORK MANAGEMENT NTR MOBILITY CONTROLLER OLLER SERV IC ES USER storage devices, VM clients, hotspots, etc. Agents exist for DEVICE LOCATION Windows, Mac OSX and Linux. APP • Guest Access: For those agencies that desire support for guest access, the ClearPass Guest Access module enables various agency personnel to manage guest Wi-Fi accounts. Please see page 34 for more details. Aruba Virtual Intranet Access Client INTERNET The Virtual Intranet Access (VIA) client is part of the Aruba remote networks solution targeted for mobile users, tablets, smartphones, and laptops. VIA detects the user’s network environment as either trusted or un-trusted. VIA automatically scans and selects the best secure connection to the enterprise network. Trusted networks typically refer to HOME OFFICE ON THE ROAD REMOTE ACCESS POINTS WINDOWS MACOS LINUX iOS ANDROID a protected enterprise network that allows users to directly access network resources. Un-trusted networks are outside figure 11.0_100416_government-sga public areas such as airports, hotels, home networks, etc. When VIA detects that it is on an un-trusted network, the Figure 11: Virtual Internet Access Client figure 1.0_102214_via-dsa client launches a secure IPSec or SSL connection to the enterprise network to allow access to network resources. VIA Aruba Mobility-Defined Networks for Government can function automatically off of Wi-Fi, wired, and even Government agencies recognize the need and productivity 3G/4G cellular networks. gains for deploying commercial, consumer-grade mobile VIA provides a zero-touch end user experience by automatically configuring and also determining when to establish a secure IPSec or SSL connection back to the enterprise network without requiring any user intervention. devices, such as smartphones, tablets, and laptops. Doing so requires an architecture that supports users and their mobile devices in both an onsite WLAN facility and remote/global field areas where 3G and 4G capabilities exist. Because the VIA client communicates to an Aruba controller The next generation of access networks must focus squarely for secure connectivity, no additional hardware is required. on users and their devices, applications and locations. Aruba Software and configuration updates can also be Mobility-Defined Networks are based on a user-centric, accomplished automatically without any user intervention. role-based access architecture, supporting secure mobility In addition to its remote access capabilities, VIA supports Suite-B cryptography for accessing government grade unclassified, confidential and classified information. When utilized within government networks, the VIA client works in conjunction with the ArubaOS Advanced Cryptography (ACR) module, which provides a securely authenticated and encrypted tunnel between the client and Aruba controller using NSA approved Suite-B algorithms. for wired, wireless and remote access. The components previously listed in this section are all part of Aruba MobilityDefined Networks for Government. This architecture securely unifies disparate computing infrastructures, such as wireless, wired, and remote access VPN services, into one seamless network access solution – for government employees, contractors, visitors, and military personnel in garrison or in deployment. Authorized users are able to access network 11 SOLUTIONS GUIDE GOVERNMENT resources wherever they need them, with automatic access Aruba Mobility-Defined Networks for Government provide policy enforcement based on who they are – no matter a common set of network services that manage security, where they are, what devices they use or how they connect. policy, and network performance for every user and device on the network, regardless of method of access. These The Aruba Mobility-Defined Networks for Government services include: architecture addresses the needs of the mobile enterprise by providing context-aware services that collects the following • Identity management attributes for each session: • Device profiling and configuration • Device posture check • User identity and role, such as government employee, • Context-based policy enforcement contractor, visitor, etc. • Application traffic management • Device identity, including type, such as laptop, tablet, • Guest access smartphone, etc. • Content security • Application fingerprinting, including type (data, voice, video) • RF Spectrum management • User location (base, post, garrison, remote facility, etc.), • Network configuration time of day and access medium (wired, wireless, cellular) • Compliance enforcement and reporting This context-aware approach to network access eliminates the need to maintain VLANs at the network edge. Contextaware access policies allow IT to control users and devices so that employees can switch effortlessly between desktops, laptops, tablets, smartphones, and other mobile devices and have a single, consistent way to access the appropriate network resources. DATA CENTER MOBILITY CONTROLLER USER DEVICE LOCATION APP THIN ACCESS ON-RAMPS WIRELESS WIRED VPN REMOTE OFFICE OUTDOOR • Enforcement accross any network type • Device profiling with advanced posture • Multi-point access visibility • Secure nad highly scalable ANY DEVICE WINDOWS MACOS iOS ANDROID figure 12.0_100416_government-sga Figure 12: Expanded Mobility-Defined Networks for Government Architecture figure 12.0_100416_government-sga 12 SOLUTIONS GUIDE GOVERNMENT Aruba Mobility-Defined Networks for Government support a Concept of Operations wide range of network access modes that leverage its Building an Aruba access network requires the key common set of network services to deliver consistent, components described previously – Access Points (APs), reliable and secure context-aware access for users. These centralized Mobility Controllers and optional ArubaOS on-ramp access modes include: software modules. These components can be installed • Wireless Access Points: Aruba 802.11n/ac APs support distributed and centralized traffic forwarding modes, while providing best-in-class RF management through Adaptive Radio Management (ARM) technology. All Aruba APs offer RF management and monitoring capabilities without requiring dedicated modes of operation. • Aruba Switches: Aruba has extended the user-centric, services-based approach of the Mobility-Define Networks to a new class of wired APs. Designed to provide network access in wiring closets, Aruba switches with HPE Smart Rate connect wired Ethernet devices such as virtual desktops, IP phones, videophones, video surveillance cameras and 802.11 APs. • Remote APs: Aruba Remote APs (RAPs) automatically extend enterprise resources to branch and home office networks using site-to-site VPN tunnels to the central data center. Using zero-touch configuration, employees at branch and home offices can easily set up their own RAPs with no IT assistance. • Outdoor: Aruba outdoor rated access points provide and configured to support a wide range of environments and applications, such as building WLANs, large campus WLANs, outdoor mesh networks, and remote access solutions. A more detailed description of these use cases and deployment models can be found in a later section of this document. The Figure 13 illustrates a typical Campus WLAN network topology with Aruba APs and controllers. 1.In this system, the centralized master and local mobility controllers are deployed in a combination of data center locations and communications closets/IDFs/MDFs. Master and local controllers should be selected and purchased based on their installation location and the size of network they will support, measured by both expected AP-count and user-count. If more network and controller capacity is required, additional local controllers can be easily installed and a portion of the existing network can be managed by the new controller. 2.The APs act as network-attached radios that perform dual-radio, multi-frequency capabilities to provide only transceiver and air monitoring functions, commonly high-performance wireless mesh capabilities to referred to as “thin” APs. APs should be selected based on outdoor environments. the number and types of client devices to be supported, • Virtual Intranet Access (VIA) client: This Aruba software the availability of relatively clear 802.11 RF frequencies client provides secure remote network connectivity for in the building(s) and the desire to “future proof” the Apple iOS, Android, Mac OS X and Windows mobile devices network. For example, many organizations are now and laptops. deploying high-throughput, dual-radio 802.11n/ac APs, Aruba Mobility-Defined Networks for Government combine advanced WLAN technology with government validated and configuring the 2.4Ghz radio to support legacy b/g client devices while simultaneously configuring the 5Ghz radio policy compliant mobile device software supporting stringent for high-performance 802.11n/ac client device connectivity. government security regulations such as Common Criteria For more information on both controller selection and Certification, FIPS 140-2 Validation, DoD directives 8100.2 AP selection specific to campus network deployments, and 8420.1 Compliance. The solution provides this policy see the Aruba Campus Validated Reference Design compliant and validated technology that all US government Guide, found on Aruba’s website. agencies are required to utilize. 3.APs are installed according to a basic site plan that takes into account coverage and performance requirements, access point type, building construction and code requirements, Ethernet cabling availability (unless using mesh) and aesthetics. 13 SOLUTIONS GUIDE GOVERNMENT DATA CENTER MANAGEMENT AWMS Server NETWORK SERVICES MASTER active MASTER standby POS File RADIUS PBX INTERNET AGGREGATION Control Local Mobility Controller Local Mobility Controller ARM + WIP Telemetry Data NETWORK ACCESS AT THE APS Data Air Monitor figure 13.0_100416_government-sga Figure 13: Aruba Campus Wireless LAN Architecture figure 13.0_100416_government-sga 4.ArubaOS can be configured and monitored from the master controllers and/or the AirWave Management System – both have the capability of centrally managing the entire network of controllers and APs. The base network configuration (IP addressing, VLANs, 802.1X or other authentication methods, etc.) are configured and the optional software modules are activated through license keys and then configured for their operations. Policies, templates and AP grouping make the configuration management process both straightforward and also powerful in its flexibility. 5.Once installed and configured, the APs will be automatically and dynamically configured by their controller to meet the coverage and performance requirements according to the plan. This automated configuration method eliminates the complex site survey process required by earlier generation WLAN architectures. Figure 14: Example WLAN – AP Coverage Map 14 SOLUTIONS GUIDE GOVERNMENT Aruba customers have heterogeneous networks, built on a Client connectivity and traffic engineering and management wide variety of equipment, topologies, protocols and within the Aruba architecture are very different than in interfaces. Aruba products are designed for flexible, non- traditional L1/L2 networks. Within a typically configured disruptive deployment in such environments. Because an Aruba enterprise network: Aruba network is designed as an overlay solution, the 1.Clients and users are authenticated prior to joining existing network is used only for transport – the wired any production network or VLAN via standard Wi-Fi and network has no awareness that it is carrying wireless traffic. AAA mechanisms. Therefore, the existing network need not be reconfigured or 2.All traffic is encrypted from the client, flowing across restructured in any way to add mobility. As long as there is all L1/L2/L3 boundaries untouched (except by QoS an open IP communications path between the access mechanisms on outer headers), then arriving at the points and their controller, the system will be 100% controller. In this manner, client-to-core security is functional. This overlay WLAN architecture allows for a provided where every traffic flow and packet is both modular, phased introduction of mobility from pilot network authentic and eavesdrop protected. to full-scale installation, deploying on top of existing L2 and 3.The controller decrypts the traffic, intrinsically validating L3 LAN/WAN infrastructure. its source user. Further, the ability of the Aruba architecture to intelligently 4.The controller then passes the user’s traffic through a understand the data flows traversing the network has the end result of not requiring the deployment of separate series of traffic engineering rules and application-layer VLANs to provide different network services. Aruba’s unique gateways for both performance management and architecture allows deployment of data, voice, and video security management purposes. services on the same VLANs, without negatively impacting the user community or security. DATA CENTER Web Mobility Controller File RADIUS PBX Distribution Switches CORE INTERNET Firewall DISTRIBUTION ACCESS EDGE APS Employee SSID Application SSID Guest SSID figure 15.0_100416_government-sga Figure 15: Client-to-Core Traffic Encryption and Tunneling figure 15.0_100416_government-sga 15 SOLUTIONS GUIDE 5.In this architecture, the controller knows the state of GOVERNMENT applied to users and devices in an enterprise and remote the entire network, knows the state of all the users, and environment using RAPs can apply with the use of the VIA knows the state of all application traffic flowing across client as well. this part of the network. Many network engineering challenges simply evaporate and user requirements can be instantly met, such as: • Seamless roaming around the network, between floors Aruba’s overall secure mobile solutions allows users and mobile devices access to the network from virtually anywhere, allowing for users to move and the network to follow them wherever they go. and building and even IP-network domains • The need to ensure that all applications have their relative traffic priority levels adequately supported • The need to ensure QoS for voice activity emanating from the same device as data traffic, without complex VLAN/SSID designs • The ability to prevent peer-to-peer traffic between users on the same VLAN • The ability to tune broadcast/multicast traffic to ensure optimum handheld device battery life • The ability to enforce once complex security policies (e.g. DEPLOYMENT LOCATIONS AND TOPOLOGIES The flexibility of the Aruba architecture lends itself to deployment in a variety of locations and topologies. This section explores how access networks for a wide range of government work environments can be built using Aruba components. High-performance Indoor and Campus WLAN Organizations have shifted from desktop computing to mobile computing such as laptops, smartphones and tablet limit peer-to-peer traffic) with now simple means (a PCs. Building a high-performance 802.11n/ac indoor and central device for classification and enforcement) campus mobility network to carry both voice and data traffic These same components and feature sets are present in is the most common deployment use case for Aruba. remote access solutions as well. With remote access solutions, This use case features a simple design, with an Aruba controllers are typically deployed within a DMZ providing a controller or controllers deployed in the network core or in a public facing Internet interface. APs that are deployed in a secure data center facility, with 802.11n/ac wireless APs campus environment can also be provisioned as Remote installed at the network edge, placed throughout the campus Access Points (RAP) to establish a secure IPSec connection to as appropriate to provide the needed RF coverage and the controller. These APs are can be utilized in locations such capacity. Buildings that are remote or have limited as user residences, hotels or small branch facilities. The RAPs infrastructure can be linked to the existing core infrastructure authenticate to the controller prior to actually becoming via a mesh link, activated within the software on any Aruba AP. wireless access points. Once in access point mode, clients can Users with laptops, tablets, handhelds, wireless phones and then associate and authenticate to the network the same way specialized devices can gain mobile access to networked they do in a campus environment. In essence, the campus applications, and are able to securely and seamlessly roam network is extended to remote locations, allowing users and throughout the building and campus WLAN. mobile devices to connect securely to the network. Once connected the same processes described above are in place, all transparent to the user. To take remote access a step further, mobile devices with Wi-Fi and cellular 3G/4G capabilities, such as tablets and smartphones, can access enterprise network resources in hotspot areas or on the road through the use of Aruba’s Virtual Intranet Access (VIA) client. This client can be installed from the controller onto the mobile device. Once installed, the user provides appropriate authentication credentials that will allow for a configuration profile to be downloaded to the client. The VIA client then establishes a secure IPSec or SSL connection to the controller on an as needed basis to provide the user access to enterprise network applications Below is a basic set of guidelines for designing an indoor/ campus WLAN: • Master controllers (the top-level controller in the hierarchy) are deployed in the network core or in a secure data center. Management of this network takes place on the master controller and/or the Aruba Airwave management platform. • The controllers are configured to utilize one or more RADIUS or PKI servers (Microsoft, Juniper, Cisco, etc.) for user authentication. • The controllers perform network access control functions during the user login process and traffic engineering functions during user-traffic flow. and resources. The same user roles and policies that are 16 SOLUTIONS GUIDE GOVERNMENT • Local controllers (optional depending on network scale and geography-topology) can be deployed in either the data center or in the network access, distribution or core layers of the network. • APs are typically powered by Ethernet PoE switches, but can also use AC adapters or PoE injectors. • The L2/L3 network configuration between the APs and controllers are immaterial – configurations can be created • Master controllers and local controllers can be separated by large geographic distances. Also, one pair of master controllers can service many local controllers at many distributed site locations. on the master controller to accommodate almost any L2/L3 network design. • A configuration is created and activated on the master controllers that defines: • Indoor 802.11n/ac access points with integrated antennas --L2 and L3 integration (typically) are deployed in the user space according to --RF and AP configuration an appropriate RF plan, with an AP deployment density --FIPS-encryption configuration and policies based on application, coverage, performance and --User, security and access policies capacity requirements. --QoS and traffic management policies • Where possible, capable 802.11n/ac clients should be • All APs are automatically and dynamically managed by the supported using a 5Ghz channel plan and 802.11 b/g controller and go active, allowing authorized users to clients should be supported using a 2.4Ghz plan. This will securely connect through the APs and controller to the ensure maximum performance and capacity for the backbone network. 802.11n/ac clients while simultaneously preserving support for legacy devices. DATA CENTER MANAGEMENT AWMS Server NETWORK SERVICES MASTER active MASTER standby POS File RADIUS PBX INTERNET AGGREGATION Control Local Mobility Controller Local Mobility Controller ARM + WIP Telemetry Data NETWORK ACCESS AT THE APS Data Air Monitor figure 16.0_100416_government-sga Figure 16: Aruba Campus Wireless LAN Architecture figure 16.0_100416_government-sga 17 SOLUTIONS GUIDE GOVERNMENT More detailed information on this network design can be • Reduced Reliance on Wired Networks: The wired-like found on the Aruba website in the document Campus performance of Aruba’s 802.11n/ac wireless LAN presents Wireless Networks Design. an option to reduce the reliance on edge Ethernet switches, as users migrate away from fixed desktops to The characteristics and benefits of the Aruba architecture in Wi-Fi-capable devices. Especially useful during an edge the high-performance WLAN use case are: switch refresh, offsetting wired port costs with cost- • High Performance: Aruba’s 802.11n/ac Wave 2 APs are effective 802.11n/ac wireless LANs can significantly reduce designed for 1,733 Mbps peak throughput in the 5-GHz equipment upgrade bills. The result is a network that band and 800 Mbps in the 2.4-GHz band. Additional enables user mobility, while lowering energy usage and network and user capacity can be added to the network at any location by simply adding APs to the area, which will automatically be configured and utilized by the system. annual maintenance costs. • Self-configuring: Aruba’s Adaptive Radio Management (ARM) delivers reliable self-optimizing wireless • Aruba ClientMatch™: On Aruba 802.11ac wireless access performance with features such as Band Steering, points, ClientMatch eliminates sticky clients by Co-channel Interference Mitigation, Adjacent Channel continuously gathering session performance metrics from Noise Mitigation, Spectrum Load Balancing and Air-Time mobile devices and steering clients to APs with a better Fairness. ARM technology ensures that the wireless connection. ClientMatch dynamically optimizes Wi-Fi client network is always optimized for local conditions and will performance, even while users roam and RF conditions automatically adjust power, channel, band, access point change. If a mobile device moves out of range of an AP or loading and other parameters to ensure reliable high- RF interference impedes performance, ClientMatch steers speed operation, even in extremely crowded and it to a better AP to maximize Wi-Fi performance. The result challenging environments. is higher throughput and better overall performance for all devices connected to the WLAN. Client AP1 SNR AP2 SNR AP3... AA:BB 13 35 15 3 CLIENT MATCH: HOW IT WORKS 1 Client connects to a radio 2 All radios reports probe request that they hear from the client back to the controller 3 The controller builds VBR a client centric view of the network and shares it with the associated AP The AP now has visibility into all of the available radios for the client. The AP determines if the client is connected to the optimum radio based on: 2 5 Signal Strength Channel Utilization Band 4 AP notifies controller if there is a better radio for the client 5 Controller coordinates steering across APs 6 Client is moved to the optimum radio 4 6 6 Decision information is logged on the controller and sent to AirWave 1 Step 2 will be replaced by the 11k beacon reports when available from the client 7 Step 6 will leverage the 11v QBSS transition element when available Steps 2-6 are repeated as long as the client is on the network figure 17.0_100416_government-sga Figure 17: Aruba ClientMatch figure 17.0_100416_government-sga 18 SOLUTIONS GUIDE • Application Visibility: Aruba’s AppRF technology is an GOVERNMENT • Skype for Business Solution: In both wired and wireless important tool for controlling what applications can be environments, Aruba offers a full Skype for Business used and how much bandwidth they are allowed to solution that prioritizes Skype network traffic and consume on the network. In addition to classifying the enhances the user experience. That means fewer dropped web sites by content category – gambling, pornography, calls and a higher quality video. In a wireless environment, news, etc., websites are rated by their “reputation”. This is Aruba leverages SDN integration with Microsoft Skype for a measure of how likely an end user may be infected, or Business and AppRF technology to ensure a predictable become the victim of a phishing scam, or some other unified communications experience. And only Aruba offers threat. The score is affected by presence of malware on end-to-end diagnostic visibility correlated across the Skype the site, links to other questionable sites, how long the server and mobility network, which simplifies operations web site has existed, how long it has been since it was last for the network and telecom staff. infected and other similar statistics. Over the wired access layer, the HPE Network Optimizer AppRF Dashboard provides: SDN Application for Skype for Business enables • Web browsing breakdown by categories and risks • The ability to use web categories and risks in AppRF policy making • Blocking of, QoS, Bandwidth limit, mirror, log web content • “Security” web category allows blocking of sites that present a security risk to end users • Full AMON logging of web site information into AirWave automated provisioning of network policy and quality of service to provide an enhanced user experience for Skype for Business sessions. The HPE Network Optimizer SDN Application dynamically provisions the end-to-end network path and applies QoS policy via the HPE Virtual Application Networks (VAN) SDN Controller, reducing the need for manual, device-by-device configuration, which greatly simplifies policy deployment and reduces the likelihood of human errors. • Simple web notification to users who violate policy Figure 18: AppRF and Web Content Classification Dashboard 19 SOLUTIONS GUIDE GOVERNMENT • Government-grade Security: Aruba’s controllers provide Wireless mesh networking makes it easy to extend IP a Common Criteria validated policy enforcement firewall, connectivity where no cabling plant exists, and is most client-to-core encryption, user authentication, and a host commonly used to take wireless networks outdoors – of other security features to ensure privacy and protects enabling a host of applications to previously underserved network integrity for all users. Rogue detection and WIPS areas. In the government sector, there are numerous can identify client and access point attacks and, in many situations that can be addressed by wireless mesh including instances, prevent them from occurring. continuous connectivity for large areas such as military bases, forts and camps, hospital grounds, education Warehouse, Industrial, Outdoor and Mesh WLAN campuses, warehouses, surveillance coverage for fence lines For industrial and field environments, secure WLAN access and communications for security forces. networks increase productivity by bringing the access network to personnel instead of forcing them to go to fixed Wireless access in outdoor environments presents their own workstations. By simultaneously supporting data, voice and set of unique issues and requires solutions that deal with streaming video, wireless networks provide full access to both natural and man-made obstacles, as weather and existing applications and enable new ones such as all- topology present challenges to the reliable operation of wireless mesh-based telemetry, voice recognition and wireless networks and their equipment. streaming video surveillance. Wireless networks reduce the need for expensive network-related power and data cable plant and equipment, lowering capital expenditures and mitigating potentially expensive maintenance headaches. DATA CENTER MANAGEMENT AWMS Server MASTER active MASTER standby POS File RADIUS PBX INTERNET DISTRIBUTION CENTER OR WAREHOUSE Control AGGREGATION LOCAL active LOCAL active Data NETWORK ACCESS Air Monitor figure 19.0_100416_government-sga Figure 19: Warehouse/Distribution Center Logical Design figure 19.0_100416_government-sga 20 SOLUTIONS GUIDE GOVERNMENT Below is a basic set of guidelines for designing an outdoor/ • AP power may be provided by a number of different power mesh WLAN: options – including solar panels, battery, low-voltage DC • Similar to an indoor or campus WLAN design, outdoor and industrial WLAN designs involve controllers that are power, high voltage AC and Power-over-Ethernet. • The network may only require a single SSID if the Aruba controller is used to appropriately perform security and installed in secure communications facilities and APs QoS traffic management functions based on the identified installed in areas that require wireless access coverage. user, device type, location and application. • Deployed APs are either outdoor-rated (such as Aruba’s • Special consideration should be given to ensure support AP-275) or indoor APs installed in the proper type of for all applications, including data acquisition and control enclosure with external antenna connectors. • APs may be connected by Ethernet (fiber or copper) or by activating the Mesh feature found within ArubaOS that systems, specialized handheld devices/applications and voice over WLAN. The wireless network will require continuous real-time optimization to reliably support provides AP-radio to AP-radio backhaul connectivity. mobile voice, bar code scanning, inventory management • Antenna selection and installation is based on the and data terminal applications in the presence of noise physical environment and the desired coverage pattern, and interference. Using standards-based mechanisms and may include: such as 802.1p and DSCP QoS tags, Aruba networks --Omnidirectional antennas for client access coverage, monitor the type and traffic patterns of applications in use including more specialized down-tilt antennas --Directional antennas with narrow beam width to provide a point-to-point connection to another AP using the and automatically adjust parameters to ensure reliable application delivery. Mesh feature capability found within ArubaOS --Directional antennas with wide beam width to provide partial coverage to an intended access area or to provide a multipoint mesh connection DATA CENTER Master or Local Controller POS File RADIUS PBX Mesh Portals Mesh Points Mesh Points figure 20.0_100416_government-sga Figure 20: Example Mesh Configuration figure 20.0_100416_government-sga 21 SOLUTIONS GUIDE • The Mesh feature set is used to provide intra-network GOVERNMENT Branch offices, satellite clinics, teleworkers, temporary backbone connectivity between APs when no Ethernet or workers, and traveling military commanders all require alternative backhaul is available at the AP installation location. access to mission-critical data from the agency or service --Client access APs (called Mesh Points) are single or dual data center. Traditional remote networking solutions radio APs that provide access to the local client devices --Aggregated client traffic is carried across one or more designed to address this need have either relied on virtual private network (VPN) clients or replicating routing, switching, mesh hops to one or more Ethernet connected APs firewall and other services at each remote location. Client (called Mesh Portals) VPN solutions address only a single device and require --By employing centralized cryptography on the controller revision control and driver compatibility management and instead of “per hop” encryption, no performance penalty may not be available for all platforms. Additionally, the nor security concerns arise remote user experience differs from that of a campus user, • Similarly, special consideration should be given to necessitating end user training and often resulting in help interoperability security requirements for low power, desk calls. In cases in which IT has to replicate a network battery operated handheld devices potentially sourced infrastructure at every remote location, costs are high and from multiple vendors. Mobile applications run on a deployment/maintenance is complex. wide-variety of application-specific devices (ASDs) that differ in form, input and output capabilities, operating system, security capabilities, radio types and more. The use-case differences present a special set of “mobility performance” requirements on the mobility infrastructure such as fast roaming, load-balancing and battery life improvements. To support and secure a heterogeneous set of mobile device types, Aruba’s architecture boasts a device agnostic approach. The Aruba solution follows an open standards approach and therefore does not require any proprietary client-side hook-ins or client side software for full interoperability and “mobility performance”. • Consideration should be given to the design for simple coverage versus high performance, where the former design goal will require fewer installed APs but will limit overall guaranteed throughput depending on client location. • In an outdoor environment, consideration must always be Aruba’s VBN solution dramatically simplifies the complexity and cost of deploying a remote access solution at a branch or teleworker site. Complex configuration, management, software updates, authentication, security and remote site termination tasks are handled by powerful data center-based Aruba controllers running FIPS certified ArubaOS software. Network access and management services are virtualized in the data center controllers and then pushed to low-cost, purpose-built remote access points (RAPs). RAPs provide secure connectivity and deliver centralized services to end users. FIPS certified Layer 3 IPsec tunneling between the controllers and RAPs allows any wide area network – including 3G cellular, hotel guest connections and broadband internet – to be employed. The VBN solution differs from traditional remote access solutions by focusing on user policy – instead of ports, given to the topography and changing environmental routing, subnets and VLANs. Aruba’s distributed policy characteristics to ensure the design meets performance enforcement firewall delivers policy-based control, enhanced criteria even in the worst possible RF conditions. security, and support for differentiated services based on For more information, please browse the Aruba website to access the Outdoor Mesh Solutions Guide. Secure Remote Access Aruba offers a new approach for remote networking that eliminates the cost and complexity barriers of deploying secure remote network services for government agencies. user-type/role and is always under IT control. The VBN solution is persistent, easily configured, requires no user training and delivers a plug-and-play experience that results in a more uniform and secure user experience – regardless of user location. All policies are uniformly enforced, delivering the same user experience over both wired and wireless networks. The Aruba solution allows customers to extend the data center footprint wherever users need it, through low-cost access devices and low-cost commodity network transport. The following provides an overview of the Aruba Virtual Branch Network (VBN) solution and its key features and components. 22 SOLUTIONS GUIDE DMZ GOVERNMENT ROAD WARRIOR LOCAL active From Data Center LOCAL active INTERNET OR WAN BRANCH OFFICE SITES PUBLIC HOTSPOT FIXED TELECOMMUER SITES BROADBAND CARRIER CABLE PROVIDER BOC 3G EVDO/GSM CARRIER 3G EVDO/GSM CARRIER RAP-2WG RAP-5WN RAP-5 Remote Call Center Agent Medium Branch Small Branch Fixed Telecommuter figure 21.0_100416_government-sga figure 21.0_100416_government-sga Figure 21: Virtual Branch Network Logical Design Below is a basic set of guidelines for designing a Remote Access network based on the Aruba VBN concept: • Master controllers are logically deployed in a secure data center as shown on in the diagram below. All management of this network takes place from the master controller and/or the Aruba Airwave Management platform. • The controllers utilize one or more RADIUS or PKI servers for device and user authentication. • Access points (called Remote Access Points or RAPs) are deployed in remote locations. A remote location might be a Small Office/Home Office (SOHO) or a small branch office with multiple users and multiple devices. The RAP can be placed in a fixed location (e.g. an apartment, a house) or used portably. • Any Aruba AP can be utilized as a RAP. The AP 320, 330 and 220 802.11ac series APs have an additional Ethernet port that allows the connection of wired devices, such as IP phones, laptops, etc., if desired. Crypto assist co-processors provide line-rate encryption of all wired network traffic. • Any IP-backhaul can be used to provide connectivity from the RAP’s WAN-facing Ethernet port across an “IP cloud” to the controller, including broadband Internet connections, hotel and office guest networks and SATCOM terminals. The Aruba RAP-155, 205H, and 100 series have the additional capability through its USB port to utilize wireless 3G or 4G connectivity to provide backhaul when a wired connection is not available or not desirable. • The local network configuration and the IP network topology between the APs and the controllers is immaterial – as long as there is a valid IP connection with a minimum amount of bandwidth available (128Kb/s +) – the agency/service network and all logical SSIDs are extended seamlessly to the Remote Access location. • Both wired devices (VoIP phone, desktop PC, printer, security camera) as well as wireless devices can be supported simultaneously. • Additional “overlay networks” can be operated on top of this L2/L3 remotely extended network, including TYPE-1 cryptosystems for SIPRNET access. 23 SOLUTIONS GUIDE GOVERNMENT REMOTE LOCATION ENTERPRISE LAN Printer Websites Internet Traffic Enterprise SSID Enterprise SSID INTERNET OR WAN Voice SSID RAP (No Firewall) IPsec Tunnel Firewall/NAT-T Voice SSID Enterprise IP Phone Figure 22: Secure Connectivity from the Clients/AP to the Controller vai Any Backhaul For more information on secure Remote Access network design, figure 22.0_100416_government-sga figure 22.0_100416_government-sga • Support for Any Remote Device and Application: please browse the Aruba website to access the Aruba Remote Policy-based forwarding ensures that IP-based devices Access Point (RAP) Networks Validated Reference Design. (tablets, smartphones, VoIP phones, laptops, etc.) and Aruba’s VBN solution is designed to eliminate the pain points that are common in traditional remote access solutions. Key benefits of this solution are: • Secure Communications – Across Any Backbone: All network components of the solution benefit from government-grade, agency-validated security, including FIPS 140-2, DISA UC-APL, and Common Criteria validations. Any commodity transport, such as standard broadband can be used in lieu of costly private networks. • Centralized Security and User Access Control: Centralized policies and user access control render secondary firewalls to protect the remote network unnecessary. Security is consistent across the entire solution for each user. The same authentication methods and encryption algorithms are utilized, no matter where the user accesses the network. The user’s role follows them everywhere; the same access policies and rights are enforced and used regardless of the location of the user. • Simplicity: The IT provisioning model seamlessly joins a remote access point to the enterprise network without additional log-on credentials or software to launch. Applications and devices securely join the logically extended network and work out-of-the-box without additional configuration. End-user access is simplified – the user connects, authenticates and accesses the network the same way everywhere, whether in their home, hotel room, remote branch office, automobile or anywhere else. No VPN clients or additional credentials are required for access – which results in fewer mistakes and removes the need for training the end user. services work as well remotely as they do locally – without the need for separate voice networks and related security infrastructure. The security posture of these remote devices can be further enhanced by encrypting their traffic and policing it in the data center to ensure only the right ports, protocols and servers are used. All applications, whether data, voice or video, are accessed the same anywhere the user is located. The Aruba controller consolidates access management on a single platform. • Centralized Management: All management and control functions are centralized in the Aruba controller. This user-centric management architecture eliminates the need for a separate management infrastructure and provides visibility to all users and devices, speeding fault isolation in the event of a problem. All software updates are performed by IT. These updates are automatically pushed to the RAPs without end-user intervention. Deployable Networks In some government agencies, the job location itself is variable as personnel are dispatched to where they are needed most. In these situations, the ability to access communication networks on a moment’s notice is critical. Aruba’s deployable wireless LANs are readily scaled from dozens to thousands of users and can enable the most mobile professionals – like first responders and military personnel – to easily and securely connect to off-site networks and applications. The robust design and simple operation of Aruba’s WLANs and network security systems makes them well suited for rapid deployment scenarios – aiding public safety and Homeland Security missions such as 24 SOLUTIONS GUIDE GOVERNMENT national catastrophes and disaster relief, as well as military A resilient, self-healing mesh, working in conjunction with activities like training exercises and support of temporarily Aruba’s Adaptive Radio Management (ARM) technology, deployed command staff, personnel and teams. enables radio signals to reliably hop from AP to AP without the need for data cabling. ARM automatically compensates Aruba’s deployable solution provides hardened, secure for interference, network traffic and even the types of WLAN systems that can be field deployed in varying configurations based on mission length, force structure and communications requirements. The Aruba wireless LAN is applications that run on the network. As a result, data, voice, and video applications have sufficient network resources, including airtime, to operate properly. FIPS 140-2 compliant and provides instant-on, rapidlydeployable wireless access to both classified and unclassified Mesh operation allows wireless APs to be located and networks. Small WLANs can be deployed with an Aruba relocated anywhere, quickly and reliably in even the most multi-service controller and several outdoor or APs that hazardous conditions without installing data cabling or provide connectivity for a few personnel during a brief making site modifications. The elimination of an Ethernet deployment. Large WLANs can be created through the backbone reduces complexity and setup time as well as formation of a hierarchical topology involving a combination increases network reliability through the avoidance of of multiple controllers and APs meshed together and classic cable-displacement outages. “AP grid deployments”. Aruba’s client-to-core security includes embedded user RAPs can be deployed to support secure remote access for access control, centralized encryption, a policy enforcement both wireless and wired connections. Some RAPs have firewall and wireless intrusion detection. The firewall multiple wired ports to support devices such as wired classifies traffic on the basis of user identity, device type, laptops, IP Phones, and VTC equipment. Inline Type-1 HAIPE location, and time of day and provides differentiated access encryptors can also be utilized for classified data access via for different classes of users. Access is tightly controlled, and SIPRNET. Additional information regarding integration with each user’s application traffic is inspected and validated Type-1 HAIPE solutions is available later on in this guide. against security policies to ensure compartmentalization between user groups. 3G/4G CELLULAR DEPLOYMENT VSAT Field Deployment Secure SSID Aruba Access Point Aruba Controller in Deployable Kit (Optional) INTERNET NIPRNET SIPRNET SECURE HQ DATA CENTER Secure Mesh SSID(s) Aruba HQ Controller Aruba Mesh APs HAIPE Network Accelerator figure 23.0_100416_government-sga Figure 23: Deployable Solution via RAP – 3G or SATCOM Backhaul figure 23.0_100416_government-sga 25 SOLUTIONS GUIDE Key benefits of the Aruba deployable networks solution are: • Secure communications: Government compliant, secure wireless LANs ensure all data is securely encrypted end-to-end, all the way from client to the Aruba controller housed in the HQ data center. Aruba is the first wireless LAN vendor to support stringent government security regulations such as Common Criteria and UC-APL certification, FIPS 140-2 Validation and DoD directive 8100.2 Compliance. • Ease of set up: Aruba’s WLANs can be set up or taken down within minutes with a single, centrally managed and secured remote AP and can be easily scaled from a few users to thousands. When using Aruba wireless mesh network features, APs can be deployed without the use of any intervening data cabling and can be installed, moved, or changed quickly. Custom AP packaging is available through key government integrators that provide an environmentally hardened, battery powered portable solution that allows local WLAN connectivity for many hours to days without a local power source. • Rapid, automatic local configuration: Aruba’s Adaptive Radio Management (ARM) software eliminates the need for site surveys prior to activation by using automatic, infrastructure-based controls to maximize client performance and enhance the stability and predictability of the entire Wi-Fi network, regardless of the local RF. • Real time application support: The Aruba solution wirelessly transmits data, voice and video over one network that is uniquely configured for high latency/low speed links such as SATCOM and cellular. Aruba’s ARM software allows mixed 802.11a/b/g/n/ac client types to interoperate at the highest performance levels, allocates RF airtime fairly and avoids or mitigates co-channel interference. • Centrally managed controllers: Aruba controllers perform all of the complex tasks such as RF optimization and AP management and integrates all the components GOVERNMENT Virtual Mobility Controller for Tactical Deployments DoD customers have a need for hardened, mobile, tactical MILSPEC solutions for battlefield mobility. The Virtual Mobility Controller (VMC) platform is secure ArubaOS software available in a small form factor suitable for DoD deployments. Deploying an x86 based virtual controller on certified MILSPEC platforms allows for greater flexibility in deployment options for customers. Supporting full-featured access allows for continuity of operations from the enterprise to the battlefield. VMC Tactical Capabilities: • IPSec VPN – QA Tested for IPSec Site-to-Site VPN supporting Suite-B Cryptography • VIA – Windows, MacOS, IOS, Android, and Linux supported clients. Supports both AES and Suite-B IPSec from VIA clients • AP and WLAN features • VMC Tactical Certifications: --FIPS 140-2 --Common Criteria --Listed on CSfC Components List Example Tactical Platforms: • PacStar 451 --Intel Dual-Core i5, 16 GB RAM, 2 GE ports (CPU limits 1 VMC-TACT only) --Intel Quad-Core i7, 16 – 32 GB RAM, 2 GE ports • DTECH TXC4 --Intel Core i7, 8 – 16 GB RAM, 256 – 1 TB SSD, 1 – 4 GE ports • Klas VoyagerVM --Intel Core i7, up to 16GB RAM, up to 4TB SSD • Oceus MPSP --1 Server Unit: Dual 8-Core 2.1 GHz Processor, 32 GB DRAM, 1024 GB SSD Licensed Virtualization SW (Optional) needed to deploy a secure WLAN solution – including an identity-based policy enforcement engine, Wireless IDS, Client integrity, Layer 2 encryption and remote access. 26 SOLUTIONS GUIDE GOVERNMENT VMC Tactical Use Cases Site-to-Site VPN (Outer Or Inner Tunnel) WLAN Capability Package • Suite-B algorithms required for both peer ECDSA certificate authentication and AES-GCM encryption • Outer tunnel Layer 2 Secure Wi-Fi • Aruba VMC can terminate to another VMC, 7000, or 7200 Aruba AP’s terminate “outer” tunnel (WPA2) onto the series controller dependent on deployment architecture Aruba VMC • Aruba controllers can be either Inner or Outer • Inner tunnel Layer 3 IPsec VPN VPN component Other Vendor VPN Client and gateway supporting • Vendor 2 VPN Gateways provide 2nd Suite-B IPsec tunnel Suite-B algorithms ENTERPRISE MOBILITY INFRASTRUCTURE Wireless System Firewall Enclave User Traffic Remote Access/ Boundary Protection ACCESS NETWORK VPN Gateway USER EQUIPMENT Application Client VPN Client ENTERPRISE SERVICES Enterprise Management Network CLEARPASS WLAN Client VMC Administration Devices Administration Devices WLAN CA VPN CA WIDS (Standalone or Integrated) WPA2-Enterprise AES-128 CCM IPsec VPN AES-256 Suite B GCM figure 24.0_100416_government-sga figure 24.0_100416_government-sga Figure 24: WLAN Capability Package Inner VPN Component Outer VPN Component RED NETWORK Outer VPN Component Inner VPN Component BLACK NETWORK VMC VMC RED NETWORK VMC VMC figure 25.0_100416_government-sga Figure 25: Site-to-Site VPN (Outer to Inner Tunnel) figure 25.0_100416_government-sga 27 SOLUTIONS GUIDE GOVERNMENT VPN Solution with End User Device • Aruba VMC can be positioned as inner or outer tunnel • Aruba VIA Suite-B IPSec client on mobile device (on outer termination gateway VM or inner VM) terminating the Aruba VMC • Virtual Machine on client needed when executing two • Optional Layer 7 TLS v1.2 could serve as inner Layer-3 Suite-B VPNs application tunnel OUTER TUNNEL VM Inner VPN Gateway Outer VPN Gateway Gray Data Network RED NETWORK Outer VPN Client BLACK NETWORK Inner VPN Client Application VMC Gray Management Network CLEARPASS Admin Workstation Certificate Authority End User Device (with Inner and Outer VPN Client) Certificate Authority Admin Workstation INNER TUNNEL VM Inner VPN Gateway Outer VPN Gateway Gray Data Network RED NETWORK BLACK NETWORK Outer VPN Client Inner VPN Client Application VMC Gray Management Network CLEARPASS Admin Workstation Certificate Authority Admin Workstation Certificate Authority End User Device (with Inner and Outer VPN Client) Solution Boundary figure 26.0_100416_government-sga Figure 26: VPN Solution with End User Device figure 26.0_100416_government-sga 28 SOLUTIONS GUIDE GOVERNMENT Mobile Access over Private LTE Multiple Classification Site-to-Site • Based on the Mobility Access Capability Package, but uses • Based on the Mobility Access Capability Package, but uses Suite-B based private LTE as the outer tunnel Suite-B based private LTE as the outer tunnel • Aruba VIA Suite-B IPSec client installed on the mobile • Aruba VIA Suite-B IPSec client installed on the mobile device as the inner tunnel, terminating on the VMC device as the inner tunnel, terminating on the VMC Inner VPN Gateway Outer VPN Gateway Gray Data Network Outer LTE Client RED NETWORK Inner VPN Client Application Private Suite B LTE Tower VMC Gray Management Network CLEARPASS Admin Workstation Certificate Authority Admin Workstation End User Device (with Inner and Outer VPN Client) Certificate Authority Solution Boundary figure 27.0_100416_government-sga Figure 27: Multiple Access over Private LTE figure 27.0_100416_government-sga SITE A SITE B Inner VPN Gateway Inner VPN Gateway NETWORK 1 SECRET (US ONLY) NETWORK 1 SECRET (US ONLY) VMC VMC CLEARPASS Admin Workstation Certificate Authority Inner VPN Gateway NETWORK 2 SECRET (COALITION) Outer VPN Gateway Outer VPN Gateway BLACK NETWORK Gray Data Network VMC Inner VPN Gateway NETWORK 2 SECRET (COALITION) Gray Data Network VMC CLEARPASS Admin Workstation Certificate Authority Gray Management Network Admin Workstation VMC Network 1 VMC Network 2 Certificate Authority Solution Boundary figure 28.0_100416_government-sga Figure 28: Multiple Classification Site-to-Site figure 28.0_100416_government-sga 29 SOLUTIONS GUIDE GOVERNMENT GOVERNMENT USE CASES AND SOLUTIONS Although it is well known that spending on wired connectivity This section describes use cases specific to the government is inherently inefficient, there has long been an absence of sector and outlines Aruba’s solutions that address credible alternatives. However, Aruba’s adaptive 802.11n/ac requirements specific to government agencies. Wi-Fi technology allows the model to change, providing the performance, security and ease of management that Primary Network Cost Savings enables administrators to reduce reliance on wired networks Given today’s budget constraints, cost control and capital as the primary means of connectivity. Based on the Aruba preservation is a key concern for every government agency. Campus WLAN design, this particular solution involves a Historically, building out the wired LAN has contributed medium-to-high AP density deployment model and leverages greatly to the excessive spending on network infrastructure. the entire RF and security feature set of the Aruba Local-area network design has largely followed the same architecture. The key goal is to reduce the number of methodology since the mid-1990s – hierarchically connected Ethernet ports in the infrastructure and related cabling, Ethernet switches in the core, distribution and access layers switches and maintenance. with every user connected to a single switch port. Over time, A single Aruba 802.11n/ac access point can support multiple more cable drops have been added and more switch ports simultaneous users at a cost of 10%-15% of a typical 48-port per user have been purchased as part of the standard switch at list price. Aruba’s adaptive 802.11n/ac technology configuration. Even with a shift to laptop systems for mobile may cost just 10% of a comparable wired build-out and can computing, it is still common to install two to four wired ports significantly reduce yearly recurring costs. The administration for every user, connected by large multi-port switches and costs of adds/moves/changes disappear. Additionally, Aruba miles of cabling. A building with 1,000 users would require un-tethers users so they can work more productivity, roam 4,000 ports, 4,000 cable drops, minimum of 100 Ethernet freely, and collaborate more easily. switches and untold maintenance fees. REPRESENTATIVE 12-PERSON WORKGROUP v 12 VoIP Phones D 7 Desktop PCs L 5 Laptop PCs 1 Wireless AP (mobile devices, guests, etc.) C 6 Conference Room and Public Area Ports O 5 Other Devices (printer, copier, fax, etc.) P 12 Ports (reserved for future use) AP AP EXISTING WIRED NETWORK EDGE (1:1 ratio of ports to devices) D D D D O O V V V V V V L L L L L AP P P P P P P D D D O O O V V V V V V C C C C C C P P P P P P RIGHTSIZED EDGE (1:1 many ratio of ports to users and devices) D D D D O O V V V V V V D D D O O O V V V V V V AP figure 29.0_100416_government-sga Figure 29: Cost Optimization through Ethernet Port Reduction Example 30 SOLUTIONS GUIDE The following scenarios offer the best situations for network optimization: • Department moves/adds/changes: These activities are accomplished faster and more economically when a WLAN is the primary access method and has the added benefit of minimizing port activation, deactivation and troubleshooting. • Access closet or IDF refresh: This exercise presents an GOVERNMENT • Support for a complex set of applications, including data acquisition and control systems, specialized handheld devices/applications and voice over WLAN • No-compromise interoperability and security for low power, battery operated handheld devices from multiple vendors Aruba’s unified mobility solution for logistics/industrial settings is built on the campus network design described opportunity to audit port utilization, shift all mobile previously in this document. This solution provides a secure, computer users to Wi-Fi to further reduce ports, and robust means of connecting mobile workers to the facility reduce closet hardware. network and reliably delivering business critical applications • “Greenfield” deployment: Bringing up a new building presents an opportunity to optimize the mix of wired and wireless ports from the outset, resulting in smaller closet switches, lower power consumption, and greatly reduced cabling. • Network expansion: When increasing the network size, newer segments can be designed according to actual usage requirements, avoiding the higher costs of an overdesigned wired network in favor of a more economical wireless deployment. Key Aruba features and benefits for this application include the following: • Aruba’s 802.11n/ac access points are designed for 1.3 Gbps peak throughput • Aruba’s identity-based security is more secure than wired connections • Aruba’s multi-vendor AirWave Wireless Management Suite provides remote monitoring and problem resolution that is tightly integrated to the help desk Logistics and Asset Management Like the commercial world, many government agencies have the need to manage the flow of goods, information and other resources from point of origin to point of consumption. Wireless networks are critical to facilitating the transportation, inventorying, warehousing, and materialhandling, as well as packaging of goods, machinery and data in a secure, most cost effective manner. These networks increase productivity by freeing workers from fixed workstations as well as paper notes and forms. Key requirements in a logistical or industrial environment include: no matter where users roam or the environment in which they work. Wireless 802.11a/b/g/n/ac APs provide connectivity for bar code readers, laptops, hand-held devices, phones, and related mobile clients, linking them with multi-service mobility controllers over secure mesh, LAN, or WAN tunnels. Aruba offers a wide range of APs, from diminutively packaged devices that can be carried by traveling executives to explosion-resistant ruggedized units for harsh environments. Aruba APs can be repurposed over the network, allowing one common SKU to service many applications. Configured as a remote AP, the device provides secure network access to roaming users – on the road, at remote sites, or at contractor facilities. Users gain access to the same network resources they would have at work, with the same level of security, but without the headaches of a managed client. Configured for secure mesh operation, the access points communicate wirelessly, and are a perfect way to signal over short or long distances without costly cable drops. Ideal for overcoming challenging installation scenarios, mesh is an invaluable tool where all-wireless signaling is a must. Features and benefits of this solution include: • Purpose-built solutions for harsh environments: Aruba’s ruggedized industrial wireless APs set the standard for robustness and flexibility, while the rich feature set accommodates a wide range of installation scenarios. They include a rugged IP68, NEMA UL 50 enclosure and wide operating temperature range permitting operation in physically and environmentally challenging locations. ATEX Zone 2 explosion rating, combined with fiber optic or • Robust RF management wireless mesh operation, enables APs to be situated where • Industrial-grade equipment built to withstand harsh standard commercial equipment cannot. Flexible power environments • Rapid deployment, even in areas where data cabling may be unavailable options – including solar panels, battery, high voltage AC, and Power-over-Ethernet – accommodate virtually any installation scenario. 31 SOLUTIONS GUIDE • Support for real-time applications: Wireless networks GOVERNMENT that are certified – challenging the usability and cost of must be continuously optimized in real-time to reliably government-specific proprietary crypto systems (e.g. the US support mobile voice, bar code scanning, inventory TYPE-1 system) as well as reports of low performance of management and data terminal applications in the SIPRNET access connections. presence of a variety of noise and interference sources. Using standards-based mechanisms such as 802.1p and DSCP QoS tags, Aruba’s networks monitor the type and traffic patterns of applications in use and automatically adjust parameters to ensure reliable application delivery. • Security without compromise: Mobile manufacturing devices, unlike commercial laptop PCs, are often embedded computers with rudimentary WLAN security like WEP. Aruba’s identity-based security securely connects these devices to the network and provides per-user firewall and wireless intrusion detection to protect against malicious activity and attacks. • Support for handheld and application-specific Due to these challenges, there is a desire to use commercial technology cryptosystems to provide classified network access due to the advantages found in using commercial solutions: high performance, lower acquisition and operations costs, and a rapid cycle of feature and product innovation. But the strength of the underlying crypto algorithms has simply not been robust enough to meet the stricter government communications security requirements. In addition, several of the older and widely deployed underlying cryptology methods found within commercial solutions are scheduled for government use de-certification due to the increased likelihood of exploitation. devices: Mobile applications in the extended retail Ultimately what is needed is a solution that features the industry (retail stores, warehouses and factory floors) are characteristics of a commercial technology augmented with unique in that they are not run on a traditional Windows- stronger underlying cryptography algorithms. Aruba, in based device. On the contrary, mobile applications run on conjunction with the NSA through its Commercial Solutions a wide-variety of application-specific devices (ASDs) that for Classified (CSfC) program, has developed an alternative differ in form, input and output capabilities, operating access network architecture for classified network systems, security capabilities, radio types and more. connectivity. This alternative architecture uses the collection The use-case differences present a different set of of protocols and methods referred to as Suite B, and is “mobility performance” requirements on the mobility intended to be easier to deploy and manage, has better infrastructure such as fast roaming, load-balancing and operational performance and offers multiple access battery life improvements. To support and secure a methods, including wired, wireless and remote access. heterogeneous set of mobile device types, Aruba’s This solution conveys the following benefits: architecture boasts a device agnostic approach. The Aruba solution follows an open standards approach and therefore does not require any proprietary client-side hook-ins or client side software to get full interoperability for delivering optimal “mobility performance.” Classified Networking Solutions Using Commercial Technology • Improve classified network access to authorized personnel: --Enable mobility through high performance, classifiedcapable WLAN --Avoid the time and expense of physical hardened network connections --Expand classified network and application usage to larger user population Over the past decade, military, intelligence and critical civilian --Lower cost to purchase agencies have transitioned to “network-centric” applications --Lower cost to operate to support their operations. The most important applications used by these agencies reside on tactically secret networks (i.e., the US Department of Defense SIPRNET), that have experienced a dramatic increase in importance and usage over the past decade. However, these organizations do not provide classified network access to all possible authorized users, and there are limitations on where this technology can • Enhance user adoption and satisfaction: --Improve individual user performance and overall classified network capacity --Reduce or eliminate use of Controlled Cryptographic Items that must be physically secured when not in use --Increase the number and flexibility of use cases and classified access mission profiles be used, which severely hampers personal mobility. The under-utilization of classified resources is typically attributed to the expense of installing classified network connections 32 SOLUTIONS GUIDE GOVERNMENT • Future-proof the network architecture: --Elevate the overall communications security posture of new unclassified networks in anticipation of the deprecation of older crypto methods --Similarly, utilize classified-capable solutions when building new unclassified networks, in anticipation of elevating them to classified status at a later date --Operate truly unclassified networks at a classified level by using commercial technology In order to protect these classified or other high-value networks from brute force attacks and other attack vectors, Suite B replaces or augments both the asymmetric cryptography algorithms (used, for example, during key exchanges) and symmetric crypto algorithms (used for unique user-session data encryption). The Suite B algorithms not only have a better overall crypto strength, but the underlying computation methods are more efficient, making them more appropriate for high-performance applications. Briefly, the Suite B protocols and methods required are: • SHA-256/SHA-384 Secure Hash • Elliptical Curve Digital Signature Algorithm certificates/ signatures (ECDSA 256/384) • Elliptical Curve Diffie-Hellman for key exchange (ECDH 256/384) • AES-128 and AES-256 user-data symmetrical cryptography, with the AES-GCM mode Aruba’s mobility controller hardware (7200 series, 6000 M3-Mk1, 3000 series and the 600 series) is designed to address these classified network access requirements by supporting Suite B. Aruba’s Virtual Intranet Agent (VIA) client also supports Suite B. The VIA client is a soft-installable NIC client driver/IP stack shim that detects whether the client device is connected to a trusted or un-trusted network, and then uses a combination of authentication and encryption to create a secure tunnel connection to its home controller. It can operate in either 802.11i WLAN Client Supplicant mode, in Ethernet LAN IPSec figure 30.0_100416_government-sga Figure 30: Aruba Virtual Internet Agent VIA for Windows, Linux, and Android are already accredited for CSfC. Additional certifications will be achieved through other agencies in order to deploy this solution as part of a classified access network architecture. When combined together with other appropriate networking and security technologies, they are intended to provide a classifiedcapable access network connection for local LAN, WLAN and remote access requirements. Because this solution is based on commercial crypto technology, it will be available not only to US government agencies but to other defense, government and critical infrastructure organizations world-wide. mode or in Remote Access IPSEC mode. All modes include the following protocols and methods: • SHA-256/SHA-384 Secure Hash • ECDSA certificates/signatures • ECDH for key exchange • AES-128 and AES-256 bulk symmetrical cryptography • Support for all of AES-CBC, AES-CCMP and AES-GCM modes • WLAN Mode: bSec (802.11i enhanced with Suite B) using EAP-TLS 1.2 • VPN Mode: IPSEC + Suite B using IKEv2 33 SOLUTIONS GUIDE GOVERNMENT The advantages of this solution architecture include: • Lower acquisition and operational cost advantage of a commercial solution rather than a government/ • Enabling technology for new mission profiles: Suite B proprietary solution. will fundamentally transform mobility oriented communications due to a lack of Controlled Cryptographic Item issues, which affect salability outside authorized government agencies and exportability. • Support for all access modes: The ability for the high-performance Aruba mobility controller to manage Providing Guest Access via WLAN Aruba provides multiple options for allowing guest access for wireless LANs, which can be customized based on the needed level of security or functionality: • Simple “splash page” registration, whereby a user clicks both classified WLAN users and classified wired users, to accept an acceptable use policy and is then given thereby simplifying the network design and increasing Internet access. overall security by adding access control and user firewalls • Guest authentication based on a common access for all users. code that is known to employees and can be given to • Multiple services on the same WLAN: The ability to guest users. have both unclassified and classified access available in • Self-registration over the Wi-Fi network, where users different or same coverage areas using a single WLAN supply name, phone number, email address, or other network architecture. Physical separation of user traffic details and are then given a unique username/password. based on advertised network availability and logical • Self-registration at a physical registration terminal, such as separation of user traffic through the controllers crypto a guest check-in kiosk in a building lobby. and user-firewall functions will ensure classified and • Sponsored guest registration, where a visitor must unclassified traffic is not co-mingled. supply the name of an employee who he/she is meeting. • Support for both local and remote users: The ability The sponsor must approve the guest registration by click to rapidly deploy secure access locally (using WLAN) on an email. and remotely (using Remote WLAN) using a single • Sponsored guest registration with the sending of a network architecture. password to the user’s mobile phone through an SMS/text • High performance: The Aruba M3-Mk1 Controller message. This provides the greatest degree of traceability supports 4Gb/s of AES-256 encrypted throughput that since both the sponsor identity and the guest’s mobile supports thousands of users simultaneously. Up to phone number are known. four modules can be installed into a single Aruba 6000 Controller chassis for 16Gb/s of encrypted traffic throughput. OUTSIDE SUITE B NETWORK – VENDOR B (E.G. MICROSOFT, STRONGSWAN, FORTRESS) INSIDE SUITE B NETWORK – VENDOR A (ARUBA) WLAN Aruba Suite B Controller Firewall FW IPSEC Suite B (MSFT, SS) SBU SECRET Suite B IPSEC VPN MSFT, SS Aruba bSec VIA Client Remote WLAN LAN Aruba RAP IPSEC Suite B (MSFT, SS) IPSEC Suite B (MSFT, SS) Aruba IPSec Suite B VIA Client Aruba IPSec Suite B VIA Client figure 31.0_100416_government-sga Figure 31: Example Classified Access Architecture with Aruba Suite B figure 31.0_100416_government-sga 34 SOLUTIONS GUIDE GOVERNMENT Aruba’s ClearPass Policy Manager serves as the engine that Enabled through software configuration of an Aruba enables customizable guest access services. ClearPass works controller-based WLAN, Tunneled Internet Gateway creates in conjunction with Aruba mobility controllers to enforce an encrypted data session between a mobile device and the appropriate access rights – for example, providing some Internet gateway on restricted networks, NIPRnet, or other guest users with heavily filtered and restricted guest access networks that carry sensitive data. Through encrypted while others receive more open access. Another example tunnels, authorized users utilizing commercial smartphones would be providing bandwidth or time-limit controls for guest and tablets can connect to the Internet by accessing the users. ClearPass also enables guest management features restricted network to connect to the Internet gateway, usually such as bulk creation of guest access credentials (sometimes located in the DMZ, or other location. ClearPass, either with called “scratch-off cards”), and tight integration with lobby its own user database, or by connecting to an external registration kiosks. identity store, allows authorized users to connect to the Using Aruba’s Common Criteria evaluated stateful firewall capability, guest traffic is guaranteed to be kept separate from non-guest traffic. Combined with Aruba’s IPsec and GRE tunneling capabilities, guest traffic can even be transported across restricted networks such as the NIPRnet. WLAN and enter user credentials in a captive portal. All data between the controller and the client is encrypted; data cannot mix with restricted network data, and access to network resources is prevented by the firewall tied to the user’s permission settings. Once traffic reaches the controller, it is re-encrypted and forwarded through an IP tunnel to a gateway on the commercial Internet. Mobile Device Internet Access through Restricted Networks – Tunneled Internet Gateway Most mobile device users working in a government agency are restricted from accessing the Internet from non-policy compliant mobile devices. Aruba’s Tunneled Internet Gateway is a productivity enhancing functionality that allows these mobile device users to connect to the Internet gateway through restricted networks that are normally off-limits without radical modifications to their device. Secure Telecommuter Access Mobility in the government sector is increasing at an incredible rate with workers traveling around the country or working partially or fully at home offices. The typical mobile worker (often referred to as a “road warrior”) is an employee who never sees the inside their office and who is only known by their voice and email. Some days the road warriors are working from home or in a temporary office; other days they are in hotels, airports or other Wi-Fi hotspots. ROLE-BASED ACCESS CONTROL SSID-BASED ACCESS CONTROL CLEARPASS AAA Command RADIUS LDAP AD Access Rights User 1 – Compliant Device: Connects to SSID 1 SSID 1: Restricted Staff RESTRICTED Voice User 2 – Commercial Device: Connects to SSID 2 SSID 2: Internet Gateway Encrypted Tunnel Captive Portal Secure Tunnel to DMZ Encrypted Tunnel INTERNET Single Physical AP Aruba Controller figure 31.0_100416_government-sga Figure 32: Tunneled Internet Gateway figure 32.0_100416_government-sga 35 SOLUTIONS GUIDE GOVERNMENT However, it is not only the road warriors that require remote • Road Warrior: In a typical deployment, the road warrior access. In order to improve productivity many agencies have has a setup that includes Aruba’ Virtual Intranet Agent begun to provide permanent Home Office workstation (VIA) client installed on their laptop to be used at all times. setups for users that frequently extend their workday. The VIA client allows this user to securely connect to the Additionally, government administrators have found it cost enterprise from any wired or wireless Internet connection. effective to allow employees to work exclusively from home The VIA client will have a number of advantages over on a part-time or full-time basis. traditional VPN “dialer” clients, including: Unfortunately, when any user leaves the office, productivity decreases due to lack of commonality in connectivity and remote access architectures for different devices. Various devices (web front end, VPN, SSL-VPN, etc.) are deployed for different use cases and it is not uncommon for problems to frequently occur with the access methods. The solution for the telecommuter is based on Aruba’s virtual branch networking solution described previously in this document. The architecture can vary slightly depending on specific need of the user. • For fixed small office/home office locations, Aruba APs operating in Remote AP mode provide always-on secured wired and wireless connectivity for the telecommuter’s laptop, wired VoIP phone, desktop computer or printer. --The ability to dynamically detect when operating inside versus outside the agency network --Auto-detection of “un-trusted” network and automatic secure connection establishment --Dynamic transport selection between IPsec and SSL --Auto-upgrade configuration management --Auto-management of the Windows Zero Config for all wireless client configuration --Single point of policy enforcement from the Aruba controller • Optionally, mobile RAP-3WN, RAP5WN, RAP-100 series, and RAP-155 series remote APs with USB-attached cellular modems provide a portable, always on connection to the agency network. This RAP can be used when in a location with Ethernet connectivity to the Internet (e.g. using a guest access connection or in a hotel) or on-the-go via the 3G/4G cellular modem. This portable RAP provides the same secure wireless/wired connectivity as the fixedlocation home office RAP. DMZ ROAD WARRIOR LOCAL active From Data Center LOCAL active INTERNET OR WAN PUBLIC HOTSPOT FIXED TELECOMMUER SITES CABLE PROVIDER 3G EVDO/GSM CARRIER AP-70 RAP-5WN figure 33.0_100416_government-sga Figure 33: Secure Telecommuter Access Example figure 33.0_100416_government-sga 36 SOLUTIONS GUIDE Key features and benefits for this application include: • Zero-touch installs: RAPs can be deployed without IT technicians touching any of the devices. The administrator simply configures a list of authorized RAPs on the controller, the end user enters the URL of the controller into a RAP Web browser and the rest is done automatically. • Automated local AP activation: After the RAP is provisioned, it downloads the appropriate group profile configuration for the specific AP and goes live. The RAP then detects other local WLANs and sets its internal WLAN radios accordingly, automatically activates a secure GOVERNMENT Workforce Displacement and Continuity of Operations (COOP) Many government agencies have the need to support a large percentage of geographically dispersed workers for weeks or perhaps months at a time. These situations set up the following network requirements: • Employee access to all communications and information systems from their remote location in a manner identical to their office experience • Business partner or contractor access to specific information systems from a remote location connection for user traffic, activates Corporate SSIDs in • Instant-on network that is highly portable the local environment and then detects and secures the • Ability to connect via many different broadband Internet attached wired devices. • Seamless application access: Aruba’s RAPs extend the agency/department network experience anywhere there is an Internet or cellular connection. Laptops, printers and wired VoIP phones work just as they do in the office – including internal phone dialing, fileserver access and applications access. • Resilient WAN connectivity: Should a wired WAN link fail, a select range of RAP models can automatically switch to a 3G cellular modem for dial back-up. • Always-on connectivity: Aruba’s solution supports both inter- and intra-data center redundancy. The RAP does not need to be programmed individually with route information – it is capable of discovering alternative paths automatically. Optional split-tunneling can direct Internetdestined traffic away from the enterprise network and allow direct-to-Internet access for selected sites, users and devices. • Role-based access control and policy enforcement: Both Aruba’s controller and RAP have an integrated, access methods The Workforce Displacement solution is based on Aruba’s Virtual Branch Networking (VBN) portfolio described previously in this document. This architecture provides secure, reliable remote networking for branch offices, at a price point that makes it feasible to deploy on a massive scale. One or more Aruba controllers of appropriate capacity are “hot staged” in a data center that will serve as a communications and info services hub. The controller is configured for remote access as its primary application, and is tied into various back-end systems for user authentication and management. Then by deploying inexpensive Remote Access Points (RAPs) or Branch Office Controllers (BOCs) in the remote offices, VBN creates a secure connection back to the data center over any wide-area transport, including 3G cellular, residential DSL and cable networks. Using Aruba’s AirWave software, IT staff members can monitor and manage the entire network remotely for as long as required. authentication enforcement point and Common Criteria RAPs and BOCs support the centralized management of data, validated stateful firewall. Users are authenticated by the voice, and video applications, including wired voice over IP Agency RADIUS/Directory server and the RAP will then (VoIP) desk phones and wireless smart phones. Installation is dynamically activate traffic management rules for each plug-and-play user installable and features built-in diagnostics. user. User policies that might normally only be present in Software updates are centrally disseminated, eliminating the the HQ LAN environment “follow the user” so they are need to manually upgrade hundreds or thousands of sites. active in the same way in the RAP network as well. Also, the Aruba VIA client can be used as a software alternative • Single point of management: All Aruba RAPs and VIA clients are managed from the one Aruba master controller and/or the Airwave Master Console for the entire VBN network. Code upgrades and configuration changes take place in this one location and automatically and safely propagate to all APs and clients without administrator intervention. Remote diagnostics and troubleshooting are also available from these single points of management ensuring rapid problem detection and resolution. to a Remote AP providing secure connectivity from a laptop for a single user, such as a business partner or contractor. This solution is instantly deployable – Aruba APs of various types can be pre-purchased, pre-provisioned and placed into a staging location for later distribution. APs can also be purchased “on- the-fly” and self-provisioned by the worker in their remote location. There is no software to install on the user’s laptop nor are there any configuration changes required on the user’s system or in the core network. 37 SOLUTIONS GUIDE GOVERNMENT 802.1X Auth, WPA2/AES Encryption, per User Policies AP AP IP DSL OR CELLULAR 3G Lower Cost, Easier to Deploy WAN Branch Office Controller (Larger Sites) RAP Mobility Controller VPN/Firewall figure 34.0_100416_government-sga Figure 34: COOP Logical Design Example figure 34.0_100416_government-sga Key Features and Benefits for this application are similar to approved for the host country – ensuring all CONUS and those described in detail for the Telecommuter solution OCONUS unlicensed frequency band guidelines can be met discussed in detail above including: by a common architecture. • Zero-touch installs A key Aruba feature, Adaptive Radio Management (ARM), • Automated local AP provides centralized RF management that eliminates the • Seamless application access need for site surveys and proprietary single-channel • Always-on connectivity single-MAC schemes. ARM has two purposes: maximize • Role-based Access Control and Policy Enforcement performance and minimize interference. To maximize • Centralized management, troubleshooting and reporting performance, ARM implements features such as airtime TECHNOLOGY ADVANTAGES OF THE ARUBA SOLUTION ARCHITECTURE Using the previously mentioned technology components, Aruba meets the following requirements for the deployment of secured applications over WLANs and remote networks: Requirement 1: A High Performance Wireless LAN Aruba APs can be deployed in a configuration that meets the environmental and performance requirements of the application. Any Aruba AP can be configured in any deployment mode: campus (Ethernet attached), mesh or remote. Single radio/dual radio, integrated antenna/external antenna, 802.11ac Wave 1 and 2 solutions are all available. Aruba’s purpose-built APs provide the fastest WLAN throughput compared to competitive solutions, and all functions are fully configured and controlled in real-time by the centralized Aruba mobility controller. Configuration options limit the frequency bands/channels to those fairness to prevent one client from monopolizing resources at the expense of another, automatic coverage hole detection to avoid RF dead spots and automatic load balancing to even out client load on APs and active RF channels. To minimize interference, ARM performs detailed spectrum analysis on each AP and automatically adjusts channel plans and power settings to ensure appropriate coverage, mitigates interference in real time and manages co-channel interference to coordinate access to nearby APs on the same channel. Uniquely, ARM maintains full application awareness, allowing the administrator to designate application flows that should never be interrupted for RF management. The PEFng stateful user firewall also provides user and layer-7/ application aware QoS controls for both the WLAN and the IP network attached, ensuring all user-application traffic is managed according to the policy priorities set by the agency. Additionally, bandwidth usage policies can be set to control how much WLAN bandwidth can be consumed by any single user or group of users. 38 SOLUTIONS GUIDE GOVERNMENT High performance also means high-availability. Both the Requirement 3: Advanced Network Security WLAN (via APs) and the controller can be deployed using a Security functions (including crypto, access control and number of simple redundancy options to ensure a cost- firewalling) are centralized in the controller making it possible effective but highly available WLAN solution. to correlate every packet with an authenticated user identity Included with ARM 3.0, ClientMatch is compatible with all and enforce access control on a per-user basis. Aruba’s Aruba wireless APs. ClientMatch eliminates the sticky client problem where client devices remain connected to an access point, even though access points with a better signal may be available. As the sticky client moves further away from an access point, data rates decrease, negatively affecting network throughput. ClientMatch eliminates this problem by continuously gathering session performance metrics from mobile devices and steering clients to APs with better relative mobility controllers are designed around a multi-core network processor and multi-threaded OS that allows for dynamic re-allocation of resources between multiple functions as needed. This architecture features hardware acceleration of all centralized cryptography processing. For example, Aruba’s 7200-series Mobility Controller supports up to 29Gb/s of AES crypto throughput and firewall performance at 9.5 million packets per second and 39Gbps wireless signals. The result is higher throughput and better of throughput. overall performance for all devices connected to the WLAN. In some alternative-vendor wireless networks, end-user Requirement 2: A Secure Operating Environment Ensuring the security of the WLAN deployment “air space” is paramount. The Aruba secure WLAN architecture offers advanced wireless intrusion detection and prevention software, which operates on the same AP, controller and management hardware/software as used for WLAN access. This allows for continuous monitoring and increased visibility of the airwaves with “hybrid” APs and sensors that are managed within the same infrastructure. Rogue AP/rogue client detection capability is one of many features of the Aruba wireless intrusion prevention system which provides the customer with an unparalleled wireless security solution. Wireless Intrusion Detection Services (WIDS) is a US DoD mandated requirement and an integrated WIDS solution communication encryption is performed in the access point. In this environment, sensitive keys and credentials exist on the APs, which are installed in unsecure physical locations where someone could tamper with the devices. This often requires installation of these APs into secure enclosures. In an Aruba network, sensitive information such as user encryption keys remains inside the data center in the controller. In our opinion, AP-based crypto does not provide end-to-end encryption, as mandated by DoD Directive 8100.2 – because encryption ends at the AP, not the core of the network. This mandate has forced some organizations to deploy “overlay cryptography” solutions to ensure FIPS, UC-APL and/or DoD directives compliance, which in turn increases complexity and causes significant design minimizes the resources required to manage an additional challenges and awkward end-device behavior. solution. Optional additional sensors can be deployed to Aruba’s identity-based security establishes protection based monitor for unauthorized cellular and/or Bluetooth device usage within the operating area. Aruba’s APs, mobility controller, and OS were designed to protect themselves, protect the data transmitted over the network, and protect the keys and management system that run the network. Together they comprise an enterprise wireless LAN solution that is Common Criteria and UC-APL certified, FIPS 140-2 Level 2 validated, and Directive 8100.2 compliant. on user-centric information instead of port-centric network access. By uniformly enforcing these policies regardless of where a user enters the network, security can be assured for mobile users without constraining how and where they roam. Role-based access can therefore be applied to a single SSID, used for NAC, applied to both wired and wireless networks, and delivers comprehensive access control (integrated firewall; time, location, and service policies; linkage of guest usage to internal groups; bandwidth management; secure traffic tunneling to DMZ; customized login page; active directory integration; usage audit reports). 39 SOLUTIONS GUIDE GOVERNMENT Uniquely, Aruba includes a Common Criteria validated high Requirement 4: Easy to Deploy, Monitor and Manage performance, stateful policy enforcement firewall built into Aruba’s controller software platform, ArubaOS, follows the mobility controller which is used to create interior three principles: enclaves and enforces inter-user and inter-department network security policy. Aruba’s firewall takes preventive actions dynamically against internal security breaches and attacks, and features L4-7 awareness. Since the firewall is application aware using deep packet inspection, it provides better security than the simple access control lists (ACLs) 1.Centralization of functionality that simplifies management and increases security. 2.Flexibility with regard to adding services providing investment protection. 3.Integration of network services enabling customers to deploy fewer physical products with a corresponding offered by other solutions. Aruba’s firewall also ties into voice reduction in capital and operational expenses. features like call admission control, application-aware RF scanning, and per-application QoS enforcement. Competing The mobility controller has all required deployment and vendors that do not offer stateful packet inspection cannot monitoring functions necessary for any scale WLAN, available provide these services on a per-application basis. via secure user interfaces. APs are automatically configured by the controller at power-up, and are dynamically managed in real-time by the controller as conditions change. APs can be repurposed via over-the-network software downloads for access, wireless intrusion detection (WIDS), mesh and remote access. ROLE-BASED ACCESS CONTROL Access Rights Personnel Contractor SSID-BASED ACCESS CONTROL Command Virtual – AP1 SSID: SIPR Staff CLEARPASS AAA RADIUS LDAP AD LOCAL SERVICES Voice Voice Virtual – AP 2 SSID: NIPR MWR Secure Tunnel to DMZ MWR Video DMZ Captive Portal Aruba Controller figure 35.0_100416_government-sga Figure 35: Identity Based Access Control and Traffic Policy Enforcement figure 35.0_100416_government-sga 40 SOLUTIONS GUIDE GOVERNMENT AirWave provides a single pane of glass to monitor and Additionally, Aruba offers a Virtual Mobility Controller (VMC) manage Aruba and other third party wired and wireless that provides the same features and functionality of the systems. It provides advanced WIDS functionality, UCC hardware products but in a software-only package. VMC is performance metrics, and end-to-end troubleshooting of the currently offered to DoD and other US Government wireless network. With the addition of Clarity Live, Airwave customers for tactical and other battlefield-centric use cases can now identify and track performance metrics that affect where size, weight, and power (SWAP) are of utmost concern. wireless client performance but are symptoms of upstream VMC, when combined with other software services and failures (DNS and DHCP response times, authentication applications on a VMware Hypervisor, offers a portable, failures, etc.). end-to-end, security and application stack to meet tactical Requirement 5: Rapid Validation and Accreditation Aruba is one of the few technology vendors that IA professionals fully support as being well-secured. By centralizing cryptographic functions on the controller rather than WLAN access points, sensitive information is never stored on products that are installed in physically insecure locations. Centralized crypto, combined with integrated user access control, user-level firewalling and WIDS makes Aruba’s mission needs. TECHNOLOGY REFERENCE Current ArubaOS Standards, Government Certifications and IA-Validations The following is a summary list of Aruba standards, certifications and government validations: Relevant Standards WLAN solutions more secure than many wired networks. We • Wi-Fi Alliance 802.11ac believe the comprehensive security capabilities and the • Wi-Fi Alliance 802.11n technology validations current to the architecture will allow • Wi-Fi Alliance 802.11a any DoD or other government organization to achieve an ATO. • Wi-Fi Alliance 802.11 b/g Requirement 6: Expandable, Future-proofed Architecture The Aruba architecture allows customers to build small point WLANs all the way up to centrally managed, global WLAN deployments and remote networks. Aruba solutions are used to build WLANs, Secure Remote Access networks and mesh networks – all from the same architecture, products and features. Unlike other architectures which have limited features or offer different capabilities that are hardware dependent, every major feature within ArubaOS runs on every Aruba controller and every Aruba AP – including: Wireless Intrusion Protection Services (WIPS), PEFng, mesh, remote networks, VPN, voice services, ARM, and Clarity. Aruba ultimately believes wired networks are less secure than wireless and thus do not offer the mobility and application flexibility found in wireless. We believe that government organizations will begin to deploy many different application services running on a pervasive global, mobile, highly secured distributed WLAN infrastructure. Aruba is the only vendor currently capable of delivering such an integrated WLAN architecture. • Wi-Fi Alliance WME Certification for QoS • AES-128/AES-256 CCMP; AES-GCM • 802.11i/WPA2/xSec • 802.1x including CAC card support Information assurance validations • ICSA Certified Stateful Inter-User Firewall • FIPS 140-2 Level 2 for ArubaOS v6.5.0 FIPS • FIPS 140-12 Level 1 for ClearPass Policy Manager • FIPS 140-12 Level 1 for AirWave • Commercial Product Assurance (CPA) as an IPsec Security Gateway (U.K.) • Common Criteria VPN Client PP – VIA 2.3 • Common Criteria WLAN PP (AOS controllers and APs) • Common Criteria NDPP+Firewall+VPN Gateway (AOS controllers) Department of Defense • NSA Commercial Solutions for Classified • DoD Directives 8100.2, 8500.1, 8420.1 Compliant • Unified Capabilities – Approved Products List (UC-APL) Listed • DDR1494 JF12 Equipment Radio Frequency Allocation Guidance 41 SOLUTIONS GUIDE GOVERNMENT • TAA Compliant CITS / USAF • ATO for USAF CITS 2GWLAN • I-TRM purchase list ARMY • US Army Information Assurance Approved Products List for 802.11a/b/g/n Campus WLAN, Outdoor WLAN, Mesh WLAN, Remote Access, WIDS • US Army Technology Integration Center (TIC) tested (passed) • US Army Type Accreditation NATO • NATO Information Assurance Product Catalogue (NIAPC) Listing JMIS TIMPO/NAVY • IATO from JMIS and NAVNETWARCOM • Navy HERO certification Department of Homeland Security • DHS Continuous Diagnostic Mitigation for Phase 1 Hardware Asset Management (HWAM) Military Health System (MHS) • ATO for all MHS facilities Voluntary Product Accessibility Template (VPAT) • Section 508 Compliant 1344 CROSSMAN AVE | SUNNYVALE, CA 94089 1.844.473.2782 | T: 1.408.227.4500 | FAX: 1.408.227.4550 | [email protected] www.arubanetworks.com SG_Government_120816 42
© Copyright 2026 Paperzz